X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

You’re way ahead of the game, right? After all, your company has established policies and procedures mandating how to handle internal and third-party confidential data. You’ve kept track of all regulatory changes and updated your policies accordingly. You require encryption, strong passwords, and the use of firewalls. You conduct regular training sessions with your employees and — using the latest front-page stories of data breaches and their resultant business interruptions, lawsuits, fines, and reputational damage — you have sufficiently terrified your employees into compliance. But have you thought of everything? Not if your risk management plan doesn’t include vendor-supplied software and applications.

ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.